A Progressive Exposure Approach for Secure Service discovery in Pervasive Computing Environments

Author(s):  
S. Durga

The dynamic property of pervasive computing hinders users to have complete knowledge of the relationship among services, service providers, and credentials. The involvement of only the necessary users and service providers for service discovery in pervasive computing environments is challenging. Without prudence, users’ and service providers’ requests or service information, their identities, and their presence information may be sacrificed. The problem may be as difficult as a chicken-and-egg problem, in which both users and service providers want the other parties to expose sensitive information first. In this chapter, the authors propose a progressive approach to solve the problem. Users and service providers expose partial information in turn and avoid unnecessary exposure if there is any mismatch. Although 1 or 2 bits of information are exchanged in each message, the theoretical analysis and experiments show that our approach protects sensitive information with little overhead.

Author(s):  
Feng Zhu ◽  
Wei Zhu

With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.


Author(s):  
Feng Zhu ◽  
Wei Zhu

With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-and-egg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.


Author(s):  
Feng Zhu ◽  
Wei Zhu

In pervasive computing environments, service discovery is an essential step for computing devices to properly discover, configure, and communicate with each other. We introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. Traditional authentication approaches requires much users’ involvement. PrudentExposure encodes hundreds of authentication messages in a novel code word form. Moreover, we discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. In a challenging case, both users and service providers want the other parties to expose sensitive information first. Our model protects both users and service providers.


2009 ◽  
Vol 3 (3) ◽  
pp. 107-122
Author(s):  
Feng Zhu ◽  
Wei Zhu

In pervasive computing environments, service discovery is an essential step for computing devices to properly discover, configure, and communicate with each other. We introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. Traditional authentication approaches requires much users’ involvement. PrudentExposure encodes hundreds of authentication messages in a novel code word form. Moreover, we discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. In a challenging case, both users and service providers want the other parties to expose sensitive information first. Our model protects both users and service providers.


2009 ◽  
pp. 279-289
Author(s):  
Emerson Loureiro ◽  
Frederico Bublitz ◽  
Loreno Oliveira ◽  
Nadia Barbosa ◽  
Angelo Perkusich ◽  
...  

The fast development on microelectronics has promoted the increase on the computational power of hardware components. On the other hand, we are facing a significant improvement on energy consumption as well as the reduction of the physical size of such components. These improvements and the emergence of wireless networking technologies are enabling the development of small and powered mobile devices. Due to this scenario, the so-called pervasive computing paradigm, introduced by Mark Weiser in 1991 (Weiser, 1991) is becoming a reality. Such a paradigm envisions a world where environments are inhabited by computing devices, all of them seamlessly integrated into peoples’ lives, and effectively helping to carry on their daily tasks. Among others, one major characteristic of Weiser’s vision is that each device in an environment becomes a potential client or provider of resources. Not surprisingly, pervasive computing environments are becoming dynamic repositories of computational resources, all of them available to mobile users from the palm of their hands. However, devices can unpredictably join and leave such environments. Thus, resources can be dynamically made available or unavailable. Such a scenario has a great impact on the way that resources are found and used. In the case of static environments, such as the Web, it is reasonable to look up and access resources, such as Web pages, knowing the address of their providers beforehand. On the other hand, for dynamic environments, such as the pervasive computing ones, this is not a reasonable approach. This is due to the fact that one cannot guarantee that the provider of a resource will be available at any moment, because it may have left the environment or simply turned off. A better approach would be to discover these resources based on their descriptions, or any other feature that does not require the client to know the specific address of their providers. To this end, some of the current pervasive computing solutions, like Wings (Loureiro, Bublitz, Oliveira, Barbosa, Perkusich, Almeida, & Ferreira, 2006), Green (Sivaharan, Blair, & Coulson, 2005), RUNES (Costa, Coulson, Mascolo, Picco, & Zachariadis, 2005), and Scooby (Robinson, Wakeman, & Owen, 2004), are making use of a novel approach from the branch of distributed applications, the service-oriented computing paradigm (Papazoglou, 2003; Huhns & Singh, 2005). This is due to the fact that such a paradigm provides a crucial element for pervasive computing systems, the ability for dynamically binding to remote resources (Bellur & Narenda, 2005), which enables mobile devices to find needed services on demand. However, pervasive environments may be structured in different ways. They can range from wired networks to completely wireless ones, where communication among the devices is performed in an ad hoc way. Such a characteristic indicates that the way services are provisioned in a pervasive computing environment should fit in its organization, in order to enhance the access to the services available. Considering the above discussion, in this article we provide a review on service provision and its applicability in pervasive computing. More precisely, we will list the existing service provision approaches and discuss the characteristics and problems associated with each one, as well as their usage in pervasive computing environments. We start by providing introductory concepts of service-oriented and pervasive computing, respectively in the service-oriented computing and pervasive computing sections. Next, we present the service provision techniques available and how they can be applied for pervasive computing environments. The main current solutions within this scope will be introduced in the service oriented technologies section. Some of the future trends associated with research for service provision in pervasive computing environments will be presented in the future research trends section. Finally, in the conclusions sect


2004 ◽  
Vol 9 (6) ◽  
pp. 679-692 ◽  
Author(s):  
Olga Ratsimor ◽  
Dipanjan Chakraborty ◽  
Anupam Joshi ◽  
Timothy Finin ◽  
Yelena Yesha

1997 ◽  
Vol 1 (3) ◽  
pp. 224-240 ◽  
Author(s):  
John H. Harvey ◽  
Julia Omarzu

In this theoretical analysis, we argue that a process referred to as minding is essential for a couple to feel mutually close and satisfied in a close relationship overa long period. Minding represents a package of mutual self-disclosure, other forms of goal-oriented behavior aimed at facilitating the relationship, and attributions about self's and other's motivations, intentions, and effort in the relationship. Self-disclosure and attribution activities in minding are aimed at getting to know the other, trying to understand the other's motivations and deeper dispositions as they pertain to the relationship, and showing respect and acceptance for knowledge gained about other. We link the concept of minding to other major ideas and literatures about how couples achieve closeness: self-disclosure and social penetration, intimacy, empathy and empathic accuracy, and love and self-expansion. We argue that the minding process articulated here has not previously been delineated and that it is a useful composite notion about essential steps in bonding among humans. We also argue that the minding concept stretches our understanding of the interface of attribution and close relationships. We present research possibilities and implications and consider possible alternative positions and counterarguments about the merits of the minding idea for close relationship satisfaction.


2005 ◽  
Vol 4 (4) ◽  
pp. 81-90 ◽  
Author(s):  
Fen Zhu ◽  
M.W. Mutka ◽  
L.M. Ni

Sign in / Sign up

Export Citation Format

Share Document